• Title/Summary/Keyword: Wired Access Network

Search Result 110, Processing Time 0.021 seconds

Design and Implementation of Protocol to Transfer Secure Messages for PDA (PDA에서 운용 가능한 보안 메시지 전송 프로토콜 설계 및 구현)

  • Lee, Ki-Young;Lee, Jeong-Kyoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.181-187
    • /
    • 2005
  • This paper proposes and implements a service model to transfer messages safely for PDA on CDMA wireless network and a secure massage transfer protocol which considers characteristics of PDA. Proposed service uses SMS(Short Message Service) connect to a off-line client device with the wired network for data communication. After receiving SMS message, client device processes the SMS message and creates a data channel through RAS(Remote Access Service), then the data of the server can be pushed to clients. The implemented security protocol can provide safe data transmission on each communication line through two way channels(SMS and data). Also, by using security nonce table, this protocol can reduce a number of transmissions for exchanging a safe session key, so intensity of encryption can be increased.

An Energy-Efficient MAC Protocol for Wireless Wearable Computer Systems

  • Beh, Jounghoon;Hur, Kyeong;Kim, Wooil;Joo, Yang-Ick
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.7-11
    • /
    • 2013
  • Wearable computer systems use the wireless universal serial bus (WUSB), which refers to USB technology that is merged with WiMedia physical layer and medium access control layer (PHY/MAC) technical specifications. WUSB can be applied to wireless personal area network (WPAN) applications as well as wired USB applications such as PAN. WUSB specifications have defined high-speed connections between a WUSB host and WUSB devices for compatibility with USB 2.0 specifications. In this paper, we focus on an integrated system with a WUSB over an IEEE 802.15.6 wireless body area network (WBAN) for wireless wearable computer systems. Due to the portable and wearable nature of wearable computer systems, the WUSB over IEEE 802.15.6 hierarchical medium access control (MAC) protocol has to support power saving operations and integrate WUSB transactions with WBAN traffic efficiently. In this paper, we propose a low-power hibernation technique (LHT) for WUSB over IEEE 802.15.6 hierarchical MAC to improve its energy efficiency. Simulation results show that the LHT also integrates WUSB transactions and WBAN traffic efficiently while it achieves high energy efficiency.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

A TCP Fairness Guarantee Scheme with Dynamic Advertisement Window Adjustment for Mobile Broadband Wireless Access Networks (이동 광대역 무선 접속 네트워크에서 동적 Advertisement Window 조절을 통한 TCP Fairness 보장 기법)

  • Kim, Seong-Chul;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.154-163
    • /
    • 2008
  • In a mobile broadband wireless access (MBWA) network, many users access a base station (BS), which relays data transferred from high-speed wired network to low-speed wireless network. For this difference of their data rate, a BS suffers from the lack of its buffer space when many users run multiple applications at the same time, and thus packet losses occur. TCP, which guarantees end-to-end reliability, is used as transport protocol also in wireless networks. But TCP lowers their transmission rate incorrectly and frequently whenever packet losses occur. And they increase their transmission rate differently with each other; finally TCP throughput of each TCP flow varies largely, and then TCP fairness goes worse. In this paper, a scheme that controls packet transmission rate adaptively according to TCP flows' transmission rate, that prevents buffer overflows at BS, and that guarantees TCP fairness at a certain degree is proposed. As it is analyzed by simulations, the proposed scheme enhances TCP fairness by maintaining TCP throughput of each TCP sender similarly with each other.

  • PDF

Implementation of RFID Data Transmission System using Wireless LAN (무선LAN 기반 RFID 데이터 전송시스템 구현)

  • 김종호;김영길;백수열
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1055-1059
    • /
    • 2004
  • A RFID(Radio Frequency Identification) system is a kind of radio frequency communication system and a branch of automatic data collection system. RFID system consists of RFID tags(or transponders) and RFID readers(controllers). This paper deals with the wireless communication that acquires tag IDs through RFID readers, and show the implementation of the target system which transmits tag IDs and related information to the server on the Internet through the wireless local area network. Today's RFID systems are usually implemented with the wired communication environment. In this paper, however, RFID system is effectively realized with the widely deployed wireless local area network and various RFID data can be collected by the readers which are communicating with the wireless access points of the local area network. Through the Internet, users also can have easy access to the server on the web and retrieve, analyze, and utilize tags' information.

A Next-generation Mobility Management Scheme for an IPv4/IPv6 Dual-stack Terminal (듀얼스택 단말을 지원하는 차세대 이동성 지원 기술 연구)

  • Lee, Kyoung-Hee;Lee, Sung-Kuen;Lee, Hyun-Woo;Han, Youn-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1182-1191
    • /
    • 2011
  • In this paper, we propose a network-based IP mobility management scheme, called Access Independent Mobile Service with IPv4/IPv6 Dual Stack (AIMS-DS), which can provide high-quality multimedia services to IPv4/IPv6 dual-stack mobile nodes (MNs) without any interruption over various wireless/wired access networks. The proposed scheme provides an MN with a fast and reliable mobility service among heterogeneous wireless access networks through the network-based control, the complete separation method of control and data plane, the cross-layer (layer2 and layer3) interworking method for handover control acceleration, etc, In addition, the proposed AIMS-DS can provide seamless mobility service to an MN under the environments of IPv4/IPv6 coexisting networks through the home address mobility support and transport network support. Through performance evaluation with computer simulations, we have shown the superiority of the proposed AIMS-DS in terms of handover latency, packet 1085 and packet delivery latency.

Enhanced MAC Scheme to Support QoS Based on Network Detection over Wired-cum-Wireless Network

  • Kim, Moon;Ye, Hwi-Jin;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2006
  • In these days, wireless data services are becoming ubiquitous in our daily life because they offers several fundamental benefits including user mobility, rapid installation, flexibility, and scalability. Moreover, the requests for various multimedia services and the Quality of Service (QoS) support have been one of key issues in wireless data communications. Therefore the research relative to Medium Access Control (MAC) has been progressing rapidly. Especially a number of QoS-aware MAC schemes have been introduced to extend the legacy IEEE 802.11 MAC protocol which has not guaranteed any service differentiation. However, none of those schemes fulfill both QoS features and channel efficiency although these support the service differentiation based on priority. Therefore this paper studies a novel MAC scheme, referred to as Enhanced Distributed Coordination Function with Network Adaptation (EDCF-NA), for enhancements of both QoS and medium efficiency. It uses a smart factor denoted by ACK rate and Network Load Threshold (TH). In this paper, we study how the value of TH has effect on MAC performance and how the use of optimal TH pair improves the overall MAC performance in terms of the QoS, channel utilization, collision rate, and fairness. In addition, we evaluate and compare both the performance of EDCF-NA depending on several pairs of TH and the achievement of various MAC protocols through simulations by using Network Simulator-2 (NS-2).

A Duplicate Address Resolution Protocol in Mobile Ad Hoc Networks

  • Lin Chunhung Richard;Wang Guo-Yuan Mikko
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.525-536
    • /
    • 2005
  • In an IP-based network, automated dynamic assignment of IP addresses is preferable. In most wired networks, a node relies on a centralized server by using dynamic host configuration protocol (DHCP) to obtain a dynamic IP address. However, the DHCP­based approach cannot be employed in a mobile ad hoc network (MANET) due to the uncertainty of any centralized DHCP server. That is, a MANET may become partitioned due to host mobility. Therefore, there is no guarantee to access a DHCP server. A general approach to address this issue is to allow a mobile host to pick a tentative address randomly, and then use duplicate address resolution (DAR) protocol to resolve any duplicate addresses. In this paper, an innovative distributed dynamic host configuration protocol designed to configure nodes in MANET is presented. The proposed protocol not only can detect the duplicate address, but also can resolve the problem caused by duplicate address. It shows that the proposed protocol works correctly and is more universal than earlier approaches. An enhanced version of DAR scheme is also proposed in this paper to solve the situation of duplicate MAC address. The new and innovative approach proposed in this paper can make the nodes in MANET provide services to other networks and avoid packets from being delivered to incorrect destinations.

Application of Korean Alphabet Domain-Names for Convenient Information Access in a Ubiquitous Information Network (유비쿼터스 정보네트워크에서의 편리한 정보액세스를 위한 한글 자음모음 도메인명의 응용)

  • Kim, Yung-Bok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1067-1074
    • /
    • 2005
  • The mobile user interface becomes important to access information fast and conveniently, especially in the ubiquitous computing environment. Among many new services in the mobile computing environment, ubiquitous information networking service was studied using korean alphabet (consonant or vowel) domain-names including Korean single-character domain-names. Instead of handling long English/Korean URL-strings, as convenient user interface for information access, the Korean single-character/alphabet domain names are more convenient than long URL strings to retrieve information and to send information in the wired Internet as well as in the mobile Internet. We studied the convenience of Korean alphabet domain names with PCs as well as with mobile phones. We introduce the Implementation and the application of ubiquitous information portal, which has the functionality of Text to Speech (TTS) and is accessible with Korean single - character/alphabet domain - names.